The Law of Facebook

Total Page:16

File Type:pdf, Size:1020Kb

The Law of Facebook The Law of Facebook Ashutosh Bhagwat* Twenty-six years ago, Eugene Volokh published his seminal article Cheap Speech and What It Will Do, predicting many of the consequences of the then-brand-new Internet. On the whole, Volokh’s tone was optimistic. While many of his predictions have indeed come true, many would argue that his optimism was overstated. To the contrary, in recent years Internet giants generally, social media firms specifically, and Facebook and its CEO Mark Zuckerberg more specifically, have come under sharp and extensive criticism. Among other things, Facebook has been accused of violating its users’ privacy, of failing to remove content that constitutes stalking or personal harassment, of permitting domestic and foreign actors (notably Russia) to use fake accounts to manipulate American voters by disseminating false and misleading political speech, of failing to remove content that incites violence, and of excessive censorship of harmless content. Inevitably, critics of Facebook have proposed a number of regulatory solutions to Facebook’s alleged problems, ranging from regulating the firm’s use of personal data, imposing liability on Facebook for harm caused by content on its platform, treating Facebook as a utility, to even breaking up the company. Given the importance of Facebook, with over two billion users worldwide and a valuation of well over half a trillion dollars, these proposals raise serious questions. This Essay will argue that while Facebook is certainly not free of fault, many of the criticisms directed at it are overstated or confused. Furthermore, the criticisms contradict one another, because some of the solutions proposed to solve one set of problems — notably privacy — would undermine our ability to respond to other problems such as harassment, * Copyright © 2021 Ashutosh Bhagwat. Martin Luther King, Jr. Professor of Law and Boochever and Bird Endowed Chair for the Study and Teaching of Freedom and Equality, University of California, Davis School of Law. B.A. 1986 Yale University. J.D. 1990 The University of Chicago. Contact: [email protected]. Thanks to Jane Bambauer, Alan Chen, Chris Elmendorf, Greg Magarian, Dawn Nunziato, Ann Ravel, Eugene Volokh, Jim Weinstein, and participants in the UC Davis School of Law “Schmooze” for extremely helpful comments. Thanks also to the students at the UC Davis Law Review for putting together this excellent symposium. 2353 2354 University of California, Davis [Vol. 54:2353 incitement and falsehood, and vice versa. More fundamentally, critics fail to confront the simple fact that Facebook and other Internet firms (notably Google) provide, without financial charge, services such as social media, searches, email, and mapping, which people want and value but whose provision entails costs. To propose regulatory “solutions” which would completely undermine the business model that permits these free services without proposing alternatives and without taking into account the preferences and interests of Facebook users, especially in poor and autocratic countries where, for all of its conceded problems, Facebook provides important and even essential services, is problematic at best. Finally, the failure of critics to seriously consider whether the First Amendment would even permit many of the regulatory approaches they propose, all in the name of preserving democracy and civil dialogue, raises questions about the seriousness of some of these critics. Ultimately, this Essay argues that aside from some limited regulatory initiatives, we should probably embrace humility. This means, first, that unthinkingly importing old approaches such as a utility or publisher model to social media is wrong-headed, and will surely do harm without accomplishing their goals. Other proposals, on the other hand, might “solve” some problems, but at the cost of killing the goose that lays the golden egg. For now, the best path might well be the one we are on: supporting sensible, narrow reforms, but otherwise muddling along with a light regulatory touch, while encouraging/pressuring companies to adopt voluntary policies such as Twitter’s recent ban on political advertising, Google’s restrictions on microtargeted political ads, and Facebook’s prohibitions on electoral manipulation. Before we take potentially dangerous and unconstitutional legislative action, perhaps we should first see how these experiments evolve and work out. After all, social media is less than two decades old and there is still much we need to learn before thoughtful and effective regulation is plausible. TABLE OF CONTENTS INTRODUCTION ................................................................................. 2355 I. THE ILLS OF SOCIAL MEDIA .................................................... 2358 A. Privacy/Big Data/The Surveillance State .......................... 2358 B. Cyberstalking, Trolling, and Harm to the Vulnerable ...... 2360 C. Election Manipulation and False Political Speech ............ 2362 D. Incitement of Violence ...................................................... 2365 E. Excessive Censorship ....................................................... 2367 II. PROPOSED SOLUTIONS TO THE ILLS OF SOCIAL MEDIA ............ 2370 A. Information Fiduciaries, Data Protection, and the Nuclear Option ................................................................ 2370 2021] The Law of Facebook 2355 B. Censorship and Section 230 ............................................. 2375 C. Fact-checking and Limits on Microtargeting .................... 2378 D. Regulating Incitement, and Reconsidering Brandenburg .. 2379 E. State Actors, Utilities, and Due Process of Censorship ..... 2381 III. OBJECTIONS AND CONTRADICTIONS ....................................... 2383 A. Information Fiduciaries and Data Privacy ....................... 2384 B. Awful Content and Section 230 ........................................ 2388 C. Fact-checking and Microtargeting ................................... 2393 D. Incitement ........................................................................ 2394 E. Excessive Censorship ....................................................... 2398 CONCLUSION: HUMILITY ................................................................... 2401 INTRODUCTION Twenty-six years ago, Eugene Volokh published his seminal article Cheap Speech and What It Will Do.1 Even today, the article remains an astonishing read. It predicted the practical extinction of physical media for music,2 the explosion of video streaming,3 and more broadly the democratization of speech on public affairs.4 It also predicted the decline of information intermediaries such as the mass media,5 the possibility of increased extremist speech,6 and of filter bubbles.7 On the whole, however, the tone of the article was relentlessly upbeat. From today’s perspective, while an extraordinary number of Volokh’s practical predictions have come true, his optimism seems more questionable. To the contrary, if there is one topic on which people around the globe appear to have a consensus, it is that the Internet, and social media in particular, is the source of enormous societal problems, including the loss of privacy and the rise of “surveillance capitalism,”8 harassment and worse of women and minorities,9 and the systematic manipulation of our democracy.10 Social media has also been linked to 1 Eugene Volokh, Cheap Speech and What It Will Do, 104 YALE L.J. 1805 (1995). 2 Id. at 1808-14. 3 Id. at 1831-33. 4 Id. at 1833-38. 5 Id. at 1834-36. 6 See id. at 1848. 7 See id. at 1849-50. 8 SHOSHANA ZUBOFF, THE AGE OF SURVEILLANCE CAPITALISM: THE FIGHT FOR A HUMAN FUTURE AT THE NEW FRONTIER OF POWER 9 (2019). 9 See DANIELLE CITRON, HATE CRIMES IN CYBERSPACE 14 (2014). 10 See Alexis C. Madrigal, What Facebook Did to American Democracy: And Why It Was So Hard to See It Coming, ATLANTIC (Oct. 12, 2017), https://www.theatlantic.com/ technology/archive/2017/10/what-facebook-did/542502/ [https://perma.cc/3DHR-HDMY]. 2356 University of California, Davis [Vol. 54:2353 the incitement and encouragement of violence in places such as Myanmar.11 In addition to these sins mainly of omission, social media firms have also been charged with over-censoring harmless and even important material, such as the iconic “Napalm Girl” photograph from the Vietnam War.12 Far from constituting a vast forum for open, democratic debate, as the Supreme Court recently described social media,13 social media is widely viewed today as a cesspool. Furthermore, if social media is the broad culprit, there seems to be a similar consensus that Facebook, and its founder and CEO Mark Zuckerberg, are at the heart of the problem.14 The Facebook/Cambridge Analytica scandal is the public face of the failure of social media firms to protect user privacy.15 Facebook was the primary platform used by Russia to manipulate the 2016 presidential election,16 and Facebook has been under sustained attack by many, including President Joe Biden and Facebook’s own employees, for refusing to fact-check political advertisements and take down violent posts by prominent politicians.17 Facebook, and its subsidiary WhatsApp, were the primary mediums for inciting the pogrom against Rohingya in Myanmar as well as violence 11 Alexandra Stevenson, Facebook Admits It Was Used to Incite Violence in Myanmar, N.Y. TIMES (Nov. 6, 2018), https://www.nytimes.com/2018/11/06/technology/myanmar- facebook.html [https://perma.cc/LWD2-5M2R]. 12 Aarti Shahani, With ‘Napalm Girl,’ Facebook Humans (Not Algorithms) Struggle to Be
Recommended publications
  • Administration of Barack Obama, 2015 Remarks at the CEO Summit of the Americas in Panama City, Panama April 10, 2015
    Administration of Barack Obama, 2015 Remarks at the CEO Summit of the Americas in Panama City, Panama April 10, 2015 Well, thank you, Luis. First of all, let me not only thank you but thank our host and the people of Panama, who have done an extraordinary job organizing this summit. It is a great pleasure to be joined by leaders who I think have done extraordinary work in their own countries. And I've had the opportunity to work with President Rousseff and Peña Nieto on a whole host of regional, international, and bilateral issues and very much appreciate their leadership. And clearly, President Varela is doing an outstanding job here in Panama as well. A lot of important points have already been made. Let me just say this. When I came into office, in 2009, obviously, we were all facing an enormous economic challenge globally. Since that time, both exports from the United States to Latin America and imports from Latin America to the United States have gone up over 50 percent. And it's an indication not only of the recovery that was initiated—in part by important policies that were taken and steps that were taken in each of the countries in coordination through mechanisms like the G–20—but also the continuing integration that's going to be taking place in this hemisphere as part of a global process of integration. And I'll just point out some trends that I think are inevitable. One has already been mentioned: that global commerce, because of technology, because of logistics, it is erasing the boundaries by which we think about businesses not just for large companies, but also for small and medium-sized companies as well.
    [Show full text]
  • Workshop on Venture Capital and Antitrust, February 12, 2020
    Venture Capital and Antitrust Transcript of Proceedings at the Public Workshop Held by the Antitrust Division of the United States Department of Justice February 12, 2020 Paul Brest Hall Stanford University 555 Salvatierra Walk Stanford, CA 94305 Table of Contents Opening Remarks ......................................................................................................................... 1 Fireside Chat with Michael Moritz: Trends in VC Investment: How did we get here? ........ 5 Antitrust for VCs: A Discussion with Stanford Law Professor Doug Melamed ................... 14 Panel 1: What explains the Kill Zones? .................................................................................... 22 Afternoon Remarks .................................................................................................................... 40 Panel 2: Monetizing data ............................................................................................................ 42 Panel 3: Investing in platform-dominated markets ................................................................. 62 Roundtable: Is there a problem and what is the solution? ..................................................... 84 Closing Remarks ......................................................................................................................... 99 Public Workshop on Venture Capital and Antitrust, February 12, 2020 Opening Remarks • Makan Delrahim, Assistant Attorney General for Antitrust, Antitrust Division, U.S. Department of Justice MAKAN
    [Show full text]
  • The Politics of Social Media. Facebook Control and Resistance
    The Politics of Social Media Facebook: Control and Resistance Master thesis Name: Marc Stumpel Student number: 5850002 Email: [email protected] Date: August 16, 2010 Supervisor: Dr Thomas Poell Second reader: Dr Geert Lovink Institution: University of Amsterdam Department: Media Studies (New Media) Keywords Facebook, Network-making power, Counterpower, Framing, Protocol, Tactical Media, Exploitation, Open-source, Agonistic Pluralism, Neodemocracy Abstract This thesis examines the governance of contemporary social media and the potential of resistance. In particular, it sheds light on several cases in which Facebook has met with resistance in its attempt to exercise control. This social networking site has raised concerns over privacy, the constraints of its software, and the exploitation of user-generated content. By critically analyzing the confrontations over these issues, this thesis aims to provide a framework for thinking about an emerging political field. This thesis argues that discursive processes and (counter)protocological implementations should be regarded as essential political factors in governing the user activities and conditions on large social networking sites. A discourse analysis unveils how Facebook enacts a recurrent pattern of discursive framing and agenda-setting to support the immediate changes it makes to the platform. It shows how contestation leads to the reconfiguration and retraction of certain software implementations. Furthermore, a software study analyzes how the users are affected by Facebook‘s reconfiguration of protocological assemblages. Several tactical media projects are examined in order to demonstrate the mutability of platform‘s software. 2 Foreword My inspiration for this thesis came largely from the thought-provoking discussions in the New Media and the Transformation of Politics course.
    [Show full text]
  • M&A @ Facebook: Strategy, Themes and Drivers
    A Work Project, presented as part of the requirements for the Award of a Master Degree in Finance from NOVA – School of Business and Economics M&A @ FACEBOOK: STRATEGY, THEMES AND DRIVERS TOMÁS BRANCO GONÇALVES STUDENT NUMBER 3200 A Project carried out on the Masters in Finance Program, under the supervision of: Professor Pedro Carvalho January 2018 Abstract Most deals are motivated by the recognition of a strategic threat or opportunity in the firm’s competitive arena. These deals seek to improve the firm’s competitive position or even obtain resources and new capabilities that are vital to future prosperity, and improve the firm’s agility. The purpose of this work project is to make an analysis on Facebook’s acquisitions’ strategy going through the key acquisitions in the company’s history. More than understanding the economics of its most relevant acquisitions, the main research is aimed at understanding the strategic view and key drivers behind them, and trying to set a pattern through hypotheses testing, always bearing in mind the following question: Why does Facebook acquire emerging companies instead of replicating their key success factors? Keywords Facebook; Acquisitions; Strategy; M&A Drivers “The biggest risk is not taking any risk... In a world that is changing really quickly, the only strategy that is guaranteed to fail is not taking risks.” Mark Zuckerberg, founder and CEO of Facebook 2 Literature Review M&A activity has had peaks throughout the course of history and different key industry-related drivers triggered that same activity (Sudarsanam, 2003). Historically, the appearance of the first mergers and acquisitions coincides with the existence of the first companies and, since then, in the US market, there have been five major waves of M&A activity (as summarized by T.J.A.
    [Show full text]
  • In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
    EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28
    [Show full text]
  • Mark Zuckerberg I'm Glad We Got a Chance to Talk Yesterday
    Mark Zuckerberg I'm glad we got a chance to talk yesterday. I appreciate the open style you have for working through these issues. It makes me want to work with you even more. I was th inking about our conversation some more and wanted to share a few more thoughts. On the thread about lnstagram joining Facebook, I'm really excited about what we can do to grow lnstagram as an independent brand and product while also having you take on a major leadership role within Facebook that spans all of our photos products, including mobile photos, desktop photos, private photo sharing and photo searching and browsing. This would be a role where we'd be working closely together and you'd have a lot of space to shape the way that the vast majority of the workd's photos are shared and accessed. We have ~300m photos added daily with tens of billions already in the system. We have almost 1O0m mobile photos a day as well and it's growing really quickly -- and that's without us releasing and promoting our mobile photos product yet. We also have a lot of our infrastructure built p around storing and serving photos, querying them, etc which we can do some amazing things with . Overall I'm really excited about what you'd be able to do with this and what we could do together. One thought I had on this is that it might be worth you spending some time with.to get a sense for the impact you could have here and the value of using all of the infrastructure that we've built up rather than having to build everything from scratch at a startup.
    [Show full text]
  • Parental Control – Whatsapp
    Parental controls guide WhatsApp privacy guide Parental Controls information Type of guide Social media privacy guides Features and Benefits WhatsApp privacy settings allow you to restrict who can see your child’s messages and location. There are also ways to block delete or report users on the platform. Please note, WhatsApp new privacy policy has come into effect starting May 15. What specific content can I restrict? Chatting Downloading file sharing Location sharing Privacy Privacy and identity theft What do I need? A WhatsApp account WhatsApp privacy guide Step by step guide 1 Control who sees your information You can set your last seen, profile photo and/or status to the following options: Everyone, My Contacts and Nobody: 1. Open WhatsApp and go to your Settings, tap Account, then tap Privacy. 2. Next, tap your selected option, then choose from either option: ‘Everyone’, ‘My Contacts’ or ‘Nobody’. 3. The changes will be applied automatically. 1 WhatsApp privacy guide 2 3 WhatsApp privacy guide Step by step guide 2 How to block contacts You can stop receiving messages, calls and status updates from certain contacts by blocking them. Open WhatsApp, choose the person you want to block either by searching or scrolling through your chat list. 2. Tap on their name, then scroll down and tap Block Contact. 1 2 WhatsApp privacy guide WhatsApp privacy guide Step by step guide 3 How to report contacts 1. Open WhatsApp, choose the person you want to report either by searching or scrolling through your chat list. 2. Tap on their name, then scroll down and tap Report or Report and Block Contact.
    [Show full text]
  • Social Network
    DEADLINE.com FROM THE BLACK WE HEAR-- MARK (V.O.) Did you know there are more people with genius IQ’s living in China than there are people of any kind living in the United States? ERICA (V.O.) That can’t possibly be true. MARK (V.O.) It is. ERICA (V.O.) What would account for that? MARK (V.O.) Well, first, an awful lot of people live in China. But here’s my question: FADE IN: INT. CAMPUS BAR - NIGHT MARK ZUCKERBERG is a sweet looking 19 year old whose lack of any physically intimidating attributes masks a very complicated and dangerous anger. He has trouble making eye contact and sometimes it’s hard to tell if he’s talking to you or to himself. ERICA, also 19, is Mark’s date. She has a girl-next-door face that makes her easy to fall for. At this point in the conversation she already knows that she’d rather not be there and her politeness is about to be tested. The scene is stark and simple. MARK How do you distinguish yourself in a population of people who all got 1600 on theirDEADLINE.com SAT’s? ERICA I didn’t know they take SAT’s in China. MARK They don’t. I wasn’t talking about China anymore, I was talking about me. ERICA You got 1600? MARK Yes. I could sing in an a Capella group, but I can’t sing. 2. ERICA Does that mean you actually got nothing wrong? MARK I can row crew or invent a 25 dollar PC.
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • La Protección De La Intimidad Y Vida Privada En Internet La Integridad
    XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).
    [Show full text]
  • Facebook, Social Media Privacy, and the Use and Abuse of Data
    S. HRG. 115–683 FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA JOINT HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE AND THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 10, 2018 Serial No. J–115–40 Printed for the use of the Committee on Commerce, Science, and Transportation ( Available online: http://www.govinfo.gov VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 6011 S:\GPO\DOCS\37801.TXT JACKIE FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 S:\GPO\DOCS\37801.TXT JACKIE S. HRG. 115–683 FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA JOINT HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE AND THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 10, 2018 Serial No. J–115–40 Printed for the use of the Committee on Commerce, Science, and Transportation ( Available online: http://www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 37–801 PDF WASHINGTON : 2019 VerDate Nov 24 2008 09:24 Nov 08, 2019 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 S:\GPO\DOCS\37801.TXT JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JOHN THUNE, South Dakota, Chairman ROGER WICKER, Mississippi BILL NELSON, Florida, Ranking ROY BLUNT, Missouri MARIA
    [Show full text]
  • Facebook Timeline
    Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money.
    [Show full text]